Anomali Cyber Watch: Anomali Cyber Watch: Aggah Using Compromised Websites to Target Businesses Across Asia, eCh0raix Targets Both QNAP and NAS, LockBit 2.0 Targeted Accenture, and More

Anomali Cyber Watch: Anomali Cyber Watch: Aggah Using Compromised Websites to Target Businesses Across Asia, eCh0raix Targets Both QNAP and NAS, LockBit 2.0 Targeted Accenture, and More

The various threat intelligence stories in this iteration of the Anomali Cyber Watch discuss the following topics: China, Critical Infrastructure, Data Storage, LockBit, Morse Code, Ransomware, and Vulnerabilities. . The IOCs related to these stories are attached to Anomali Cyber Watch and can be used to check your logs for potential malicious activity. Figure 1 – IOC Summary Charts. These charts summarize the IOCs attached to this magazine and provide a glimpse of the threats…

Read More

Data privacy is a growing concern for more consumers

Data privacy is a growing concern for more consumers

People surveyed by KPMG reported feeling increasingly uneasy about the data collection practices of corporations. IMAGE: iStock/MaksimTkachenko Businesses place great value on the data they collect about their customers. Through this information, companies can send out targeted advertising, predict sales trends and improve their products. But consumers naturally see it differently. For a lot of people, data collection is an invasion of their privacy and a practice that can easily be abused, leading to mistrust…

Read More

Back-to-Basics: Secure Remote Access

Back-to-Basics: Secure Remote Access

  As small and medium businesses begin to re-open following the pandemic, it’s important to do so securely in order to protect customer’s payment card data. Too often, data breaches happen as a result of vulnerabilities that are entirely preventable. The PCI Security Standards Council (PCI SSC) has developed a set of payment protection resources for small businesses. In this 8-part back-to-basics series, we highlight payment security basics for protecting against payment data theft. Today’s…

Read More

Top 5 tech annoyances

Top 5 tech annoyances

Tom Merritt tells us his top five annoyances in tech and why they are frustrating. Technology is our job, it’s our recreation, I daresay for many of us, it’s our life.And it can be ANNOYING. Those annoyances have changed over the years. In 1996, I know some had to do with Trumpet Winsock. What are they these days? I did an informal poll of my friends in tech to find out what they find most…

Read More

Tenable Named a Winner in CRN’s 2021 Annual Report Card Awards

Tenable Named a Winner in CRN’s 2021 Annual Report Card Awards

Tenable®, Inc., the Cyber Exposure company, today announced that CRN ®, a brand of The Channel Company, has named it a winner in the Security Management category of the 2021 CRN Annual Report Card (ARC) Awards. Tenable has also won all Security Management subcategories, including product innovation, support, partnership and managed and cloud services. The awards highlight the partner trust and industry leadership Tenable has built through its Tenable Assure Partner Program. “As a channel-first…

Read More

MoD Invites Innovators to Reduce Military’s Cyber-Attack Surface

MoD Invites Innovators to Reduce Military’s Cyber-Attack Surface

The UK’s Ministry of Defence (MoD) is calling on startups to help the military reduce its cyber-attack surface by designing a new generation of more secure hardware and software. The MoD’s Defence and Security Accelerator (DASA) issued the call-to-arms on Monday, claiming it is prepared to fund proposals up to £300,000 for a nine-month contract. “The Defence Science and Technical Laboratory (DSTL) on behalf of the MoD is interested in identifying and accelerating next generation hardware and software technologies…

Read More

Are We Past Peak Ransomware? | The State of Security

Are We Past Peak Ransomware? | The State of Security

In this episode, Greg Wilson, CISO of Docupace, discussed the rise of ransomware during uncertain times (i.e. COVID pandemic), whether it’s here to stay, and how to prevent damage with security hygiene. Spotify: https://open.spotify.com/show/5UDKiGLlzxhiGnd6FtvEnmStitcher: https://www.stitcher.com/podcast/the-tripwire-cybersecurity-podcastRSS: https://tripwire.libsyn.com/rssYouTube: https://www.youtube.com/playlist?list=PLgTfY3TXF9YKE9pUKp57pGSTaapTLpvC3 In the latest episode of the Tripwire Cybersecurity podcast, I had the opportunity to interview Greg Wilson, the Chief Information Security Officer at Docupace. Tim Erlin:  Welcome, Greg. Thanks for joining us.  Today, the topic that we’re going…

Read More

The Top 10 Highest Paying Jobs in Information Security – Part 1

The Top 10 Highest Paying Jobs in Information Security – Part 1

Want a job in cybersecurity? There are plenty to go around. Cybersecurity Ventures estimated that there will be 3.5 million job openings in the industry by the end of the year. That makes sense. According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. Organizations are going to need someone to help them manage those new solutions. The issue is that information security is an…

Read More

Colonial Pipeline Reportedly Admits Data Breach

Colonial Pipeline Reportedly Admits Data Breach

Colonial Pipeline has reportedly admitted that nearly 6000 individuals may have had their personal information compromised by ransomware attackers when they struck earlier this year. The fuel pipeline operator, which was crippled by the attack in May, confirmed to CNN Business that it had begun sending out breach notification letters to 5810 victims. Most of those affected are thought to be current and former employees and family members. The compromised information is thought to include names,…

Read More
1 2,281 2,282 2,283 2,284 2,285 2,731